614,085 research outputs found

    Towards an Evaluation Model of Trust and Reputation Management Systems

    Get PDF
    The paper presents a set of concepts which can establish a basis for the creation of new evaluation model of trust and reputation management systems (TRM). The presented approach takes into account essential characteristics of such systems to provide an assessment of its robustness. The model also specifies measures of effectiveness of trust and reputation systems. There is still a need to create a comprehensive evaluation model of attacks on trust and reputation management systems and evaluation model of TRM systems itself, which could facilitate establishing a framework to deeply evaluate the security of existing TRM systems. We believe that this paper could be perceived as a small step forward towards this goal

    Intelligent trust management methodology for the internet of things (IoT) to enhance cyber security

    Full text link
    University of Technology Sydney. Faculty of Engineering and Information Technology.Nowadays, the Internet of Things (IoT) connects billions of devices (things) using the Internet. The devices could be sensors, actuators etc. The number of IoT devices growing and interacting with each other raises the issues of security and trust. Most of the existing trust and security solutions do not present a comprehensive trust management solution for IoT addressing key trust management issues for the IoT. Many of the current solutions do not consider the scalability of the IoT trust management solution. With the rapid growth of IoT nodes a significant majority of the existing techniques do not address methods (or algorithms) to detect uncompliant behaviour or attacks on the trust management approach by the IoT nodes. The uncompliant behaviour may take the form or bad-mouthing attacks, on-off attacks, contradictory attacks and bad service attacks. In the existing literature there is no trust management approach that is scalable and resilient against attacks by uncompliant IoT nodes. To address the above mentioned gaps in the existing literature body, in this thesis I propose an intelligent trust management platform for IoT (TM-IoT). The TM-IoT solution is centred on trust-based clustering of the IoT nodes. IoT nodes are grouped into clusters and each cluster is managed by a Master Node (MN). MN is a responsible for all the trust management activities within each cluster. The Super Node (SN) oversees and manages the MNs. Intelligent fuzzy-logic based and non-fuzzy logic based algorithms are presented to counter untrustworthy IoT nodes from carrying out attacks such as bad-mouthing attacks, on-off attacks, contradictory attacks and bad service attacks. To validate the proposed solutions in this thesis, simulations were conducted using Contiki network simulator for IoT environment (Cooja), which able to simulate large networks. Using the built prototype, I have evaluated and simulated our proposed solutions for the above-mentioned problems by using Cooja and C++ programming language. The obtained results demonstrate the effectiveness of the TM-IoT and also that of the algorithms in achieving their respective goals

    Assured information sharing for ad-hoc collaboration

    Get PDF
    Collaborative information sharing tends to be highly dynamic and often ad hoc among organizations. The dynamic natures and sharing patterns in ad-hoc collaboration impose a need for a comprehensive and flexible approach to reflecting and coping with the unique access control requirements associated with the environment. This dissertation outlines a Role-based Access Management for Ad-hoc Resource Shar- ing framework (RAMARS) to enable secure and selective information sharing in the het- erogeneous ad-hoc collaborative environment. Our framework incorporates a role-based approach to addressing originator control, delegation and dissemination control. A special trust-aware feature is incorporated to deal with dynamic user and trust management, and a novel resource modeling scheme is proposed to support fine-grained selective sharing of composite data. As a policy-driven approach, we formally specify the necessary pol- icy components in our framework and develop access control policies using standardized eXtensible Access Control Markup Language (XACML). The feasibility of our approach is evaluated in two emerging collaborative information sharing infrastructures: peer-to- peer networking (P2P) and Grid computing. As a potential application domain, RAMARS framework is further extended and adopted in secure healthcare services, with a unified patient-centric access control scheme being proposed to enable selective and authorized sharing of Electronic Health Records (EHRs), accommodating various privacy protection requirements at different levels of granularity

    Theoretical model on citizens' perception of public e-services: New way of adopting the administration-citizen relationship

    Get PDF
    Our theoretical contribution aims to provide a comprehensive synthesis of the application of Citizen Relationship Management (CiRM), a relationship management method inspired by the private sector. The rationale behind this theoretical methodology lies in the citizen-centric approach adopted by administrations seeking to reform their structures and improve their service delivery. By adopting digital technologies and leveraging their potential to enhance citizen interactions, these administrations aim to gain a better understanding of citizens' needs and expectations. In today's digital age, citizens expect efficient, personalized, and user-friendly interactions with administrative bodies. The advent of digital technologies presents an opportunity for administrations to transform their approach and meet these expectations. Through the implementation of CiRM, administrations can foster stronger relationships with citizens, ultimately leading to improved satisfaction and increased trust. By adopting a citizen-centric approach, administrations can tailor their services and policies to better serve the needs of the citizens they represent. Digital technologies play a crucial role in facilitating this process. They enable administrations to gather and analyze data on citizen preferences, behaviors, and feedback, allowing for evidence-based decision-making and targeted service improvements. Furthermore, effective citizen relationship management can contribute to enhanced managerial efficiency. By understanding citizens' needs and expectations, administrations can streamline their processes, allocate resources more effectively, and optimize service delivery. This not only improves the overall efficiency of administrative operations but also contributes to cost savings and resource optimization.  This article presents a conceptual model for effective citizen relationship management. The model emphasizes the importance of adopting a citizen-centric approach and leveraging digital technologies to enhance citizen interactions. By meeting citizens' expectations, administrations can foster stronger relationships, improve satisfaction, and restore trust. This, in turn, leads to a more efficient and effective administration that effectively serves the needs of its citizens.     Keywords: E-administration, CiRM, citizen-administration relationship, user satisfaction, public administration JEL Classification: H83, H11 Paper type: Theoretical Research Our theoretical contribution aims to provide a comprehensive synthesis of the application of Citizen Relationship Management (CiRM), a relationship management method inspired by the private sector. The rationale behind this theoretical methodology lies in the citizen-centric approach adopted by administrations seeking to reform their structures and improve their service delivery. By adopting digital technologies and leveraging their potential to enhance citizen interactions, these administrations aim to gain a better understanding of citizens' needs and expectations. In today's digital age, citizens expect efficient, personalized, and user-friendly interactions with administrative bodies. The advent of digital technologies presents an opportunity for administrations to transform their approach and meet these expectations. Through the implementation of CiRM, administrations can foster stronger relationships with citizens, ultimately leading to improved satisfaction and increased trust. By adopting a citizen-centric approach, administrations can tailor their services and policies to better serve the needs of the citizens they represent. Digital technologies play a crucial role in facilitating this process. They enable administrations to gather and analyze data on citizen preferences, behaviors, and feedback, allowing for evidence-based decision-making and targeted service improvements. Furthermore, effective citizen relationship management can contribute to enhanced managerial efficiency. By understanding citizens' needs and expectations, administrations can streamline their processes, allocate resources more effectively, and optimize service delivery. This not only improves the overall efficiency of administrative operations but also contributes to cost savings and resource optimization.  This article presents a conceptual model for effective citizen relationship management. The model emphasizes the importance of adopting a citizen-centric approach and leveraging digital technologies to enhance citizen interactions. By meeting citizens' expectations, administrations can foster stronger relationships, improve satisfaction, and restore trust. This, in turn, leads to a more efficient and effective administration that effectively serves the needs of its citizens.     Keywords: E-administration, CiRM, citizen-administration relationship, user satisfaction, public administration JEL Classification: H83, H11 Paper type: Theoretical Research&nbsp

    Improving supplier relationship management within the AEC sector

    Get PDF
    Due to changes in many facets of projects and organisations, relationships between firms in the delivery of construction projects have consequently become more critical for the success of the project. Whether it is a transactional exchange or series of transactions spread over a period of time, relationships need to be managed. However, the concept of managing supply chains and relationships between firms has been relatively new to construction industry. Early pioneers of the concept, primarily automotive, aerospace and manufacturing industries, have greatly benefitted from non-adversarial, long-term and collaborative relationships. Although contextual factors within those industries largely shape each industry’s approach to SCM (Supply Chain Management), it is application within the AEC industry is slowly beginning to appear in a distinct shape and form. Through a comprehensive review of literature on construction-specific SCM (cSCM), the study has identified that partnering, collaboration and trust are the three most prominent variables within the cSCM literature. Partnering and collaboration are considered to be relationship management tools, whereas trust is identified as the most significant relationship facilitator. In spite of its significance on relationship development, there is very limited research carried out on the trust aspect of relationships. By understanding how trust is built and maintained, and what the conditions that result in mistrust are, firms can better manage their supply chains and their relationships with firms in the supply chains, manage factors that result in mistrust and mitigate potential conflicts arising from mistrust. Consequently this will facilitate better collaboration, result in high-level of commitment, improve project teambuilding, and avoid conflict and adversarial relationships. Drawing on organisational relationship management literature, we argue that trust must be approached from five dimensions; economic, social, psychological, inter-personal and organisational. These dimensions are unidirectional and they must be accounted conjointly as they are interrelated and interdependent

    A Trust Model for Vehicular Network-Based Incident Reports

    Get PDF
    Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) networks are ephemeral, short-duration wireless networks that have the potential to improve the overall driving experience through the exchange of information between vehicles. V2V and V2I networks operate primarily by distributing real-time incident reports regarding potential traffic problems such as traffic jams, accidents, bad roads and so on to other vehicles in their vicinity over a multi-hop network. However, given the presence of malicious entities, blindly trusting such incident reports (even the one received through a cryptographically secure channel) can lead to undesirable consequences. In this paper, we propose an approach to determine the likelihood of the accuracy of V2V incident reports based on the trustworthiness of the report originator and those vehicles that forward it. The proposed approach takes advantage of existing road-side units (RSU) based V2I communication infrastructure deployed and managed by central traffic authorities, which can be used to collect vehicle behavior information in a crowd-sourcedfashion for constructing a more comprehensive view of vehicle trustworthiness. For validating our scheme, we implemented a V2V/V2I trust simulator by extending an existing V2V simulator with trust management capabilities. Preliminary analysis of the model shows promising results. By combining our trust modeling technique with a threshold-based decision strategy, we observed on average 85% accuracy
    • …
    corecore